Explore Website

Is Cyberspace The Latest Frontier For Conflict In Afrika?

Cyber attackers lurk in the shadows wielding the ability to hit governments where it hurts the most.

In August 2012, terrorist group, Boko Haram, reportedly hacked into Nigeria’s secret service and acquired private data on current and former personnel.

In April 2016, a group calling itself “Anonymous” was able to hack into the database of the Kenyan Ministry of Foreign Affairs and steal sensitive data, including emails and memos.

More recently, a number of South African companies’ systems were infiltrated by cyberattackers and data held for ransom. The firms included Johnny Bags food manufacturers, DSV Global and Gebers & Partners.

These incidents illustrate the risks that the use of cyberspace poses to the African continent in the 21st Century.

However, cyber security systems in both the private and the public sectors are still below average in many countries. A 2016 cyber security report, for example, shows that most Africa-based businesses and government online services have weak security features.

These low levels of security, combined with increasing connectivity, make Africa’s cyberspace one of the most vulnerable to attack.

The new frontier of attack

Cyberspace is the latest domain within which human beings operate. The others are land, sea, airspace and outer space. Unlike the other domains, cyberspace has unique features that make it an attractive frontier of attack.

First, it’s situated within the networks of computing devices that are now connected by the internet. Because the internet has global reach, attackers are able to roam cyberspace freely and attack computing systems in locations that would be impossible to access physically.

Second, no passport is required to enter the cyberspace. This makes it possible for attackers to mask their identity, impersonate others and cheat their way into protected systems.

Phishing, which is a request for data from what looks like a trusted source. The aim is to trick users into providing sensitive information, or clicking on a malicious link.

Hacking, which involves figuring out the password of a system’s platform so as to gain access into the system.

Denial of Service, which involves flooding a system’s network with traffic and spam data. The objective is to overload it and make it slow or unresponsive.

These cyber attacks happen through information exchange without physical contact between the attacker and the victim. So, at the individual level, direct physical harm is almost non-existent. The harm is mostly emotional, psychological and reputational. Of course, in some cases, cyberspace communications can result in actual physical harm. For example, a victim of cyberbullying may be pushed to commit suicide or a hacker may use the gained data to track a victim and commit rape or murder. But these cases are isolated and indirect.

But when the attacks are targeted at state or institutional systems, they have the potential to harm society in new and critical ways.

The attacks can, for example, corrupt electoral systems or derail automated trains. They could also bring down electric grids, collapse traffic control systems, scramble financial data, explode oil refineries, and cause aeroplanes to fly out of control.

The 2007 attack against Estonia, the 2016 attack on Ukraine’s power grid and the recent claims of hacks of the US Democratic National Committee database, are illustrative of the devastating harm that a cyber attack can cause on modern society.

The realities of cyber-attacks are especially stark in developing countries, like in Africa, where the technology and skills necessary to fend off such attacks are lacking.

Securing the cyberspace

Given the importance that the cyberspace network plays in the life of modern African society, the imperative of securing this domain cannot be gainsaid.

However, a survey of 21 African countries conducted by the UN Economic Commission for Africa found that while many countries had proposed legislation, the level of deployment of security systems to combat cyber crime was low.

One practical way of countering cyber attacks is to ring the vulnerable systems with a protective firewall. This would also entail the use of end-to-end encryption to ensure that data is always protected.

It is also imperative that the users of computing devices be educated on the need to only use licensed operating systems, to create strong passwords, and to ignore suspicious messages and links.

Legislation should also be in place to identify and criminalise harmful cyber behaviour and to assign responsibilities to the various cyberspace actors including cyberspace intermediaries like internet service providers.

Contribute

So, you enjoy the content we publish on iAfrikan.com? Do you find the information and insights we share useful? You can now contribute to iAfrikan.com and help us to continue doing what we do best for you by sending as little as $10 via Credit Card/PayPal or send us some Bitcoins.

Explore Website

About iAfrikan

A media brand that produces content, podcasts, events and publications about Afrika's burgeoning science, technology and innovation sectors and how they affect culture, business and day to day life on the continent.